Sciweavers

648 search results - page 26 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
14 years 8 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
KDD
1997
ACM
143views Data Mining» more  KDD 1997»
13 years 11 months ago
Anytime Exploratory Data Analysis for Massive Data Sets
Exploratory data analysis is inherently an iterative, interactive endeavor. In the context of massive data sets, however, many current data analysis algorithms will not scale appr...
Padhraic Smyth, David Wolpert
DAWAK
2008
Springer
13 years 9 months ago
Is a Voting Approach Accurate for Opinion Mining?
In this paper, we focus on classifying documents according to opinion and value judgment they contain. The main originality of our approach is to combine linguistic pre-processing,...
Michel Plantié, Mathieu Roche, Gérar...
PVLDB
2008
82views more  PVLDB 2008»
13 years 7 months ago
Mining non-redundant high order correlations in binary data
Many approaches have been proposed to find correlations in binary data. Usually, these methods focus on pair-wise correlations. In biology applications, it is important to find co...
Xiang Zhang, Feng Pan, Wei Wang 0010, Andrew B. No...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok